Linked Questions

4 votes
2 answers
1k views

I read this interesting question on why improvising your own Hash function out of existing hash functions is bad. However this is specifically focusing on 'mixing' existing hashfunctions. What if for ...
Thomas Wagenaar's user avatar
1 vote
2 answers
5k views

Is there a good/better/best way to generate a one time pad? I would like to only utilize about 40 characters (a-z, 0-9, .,!-). What I have come up with is perhaps not the BEST way, but seems to fill ...
JustWondering's user avatar
1 vote
1 answer
272 views

I'm developing a cryptographic toolkit and plan to employ custom algorithms for hashing, password stretching, etc. Is there a way I can get them analysed? Yes, I can post it on my website and on sites ...
Nandakumar Edamana's user avatar
1 vote
2 answers
303 views

I get that people don't want to encourage other people to implement their own algorithms/implementations of algorithms due to safety issues. But on the other hand, questions about creating your own ...
user4139197's user avatar
0 votes
0 answers
32 views

I have been working on a certificate system for use (as a means of authentication) with my accounts system APIs. I am still thinking out the details, I have only watched a few videos on asymmetric ...
0xENDER's user avatar
67 votes
21 answers
73k views

Cryptology is such a broad subject that even experienced coders will almost always make mistakes the first few times around. However encryption is such an important topic, often we can't afford to ...
makerofthings7's user avatar
94 votes
10 answers
18k views

We talked about password hashing and salting in class today. Our professor had a very different understanding of the use case of salts from mine and said that you might not store the salt at all and ...
jazzpi's user avatar
  • 1,059
85 votes
10 answers
11k views

I'm afraid I'll have tomatoes thrown at me for asking this old question, but here goes. After reading that cooking up your own password hash out of existing hashing functions is dangerous over and ...
George Powell's user avatar
65 votes
7 answers
21k views

In using Argon2 for hashing passwords in my application, I've noticed it generates a string like this (e.g. for password "rabbit"): $argon2i$v=19$m=65536,t=3,p=1$YOtX2//7NoD/owm8RZ8llw==$...
PenumbraBrah's user avatar
33 votes
9 answers
26k views

Say my password is abc. I want to send it to the server over HTTP. I could send it in plaintext and let the server hash it and compare it to the entries in its database, but then anyone that can see ...
kepe's user avatar
  • 465
43 votes
9 answers
20k views

I'm implementing a salt function for user passwords on my web page, and I'm wondering about some things. A salt is an extension added to a password and then hashed, meaning the password is stored in ...
Thomas Andreè Wang's user avatar
44 votes
11 answers
9k views

I know that one shouldn't rely on "obscurity" for their security. For example, choosing a non-standard port is not really security, but it also doesn't usually hurt to do so (and may help mitigate ...
Matt's user avatar
  • 3,292
71 votes
5 answers
15k views

It seems to me that a hardware component which generates random numbers is extremely simple - just measure tiny vibrations in the hardware with a sensor, right? Maybe I'm wrong but it seems like if ...
john doe's user avatar
  • 775
25 votes
6 answers
10k views

I'm working on a cryptosystem that uses colour pictures as keys for encryption. I'm trying to guess what is the key size of my cryptosystem in order to find the feasibility of a brute force attack. My ...
Daniel Esteban Ladino Torres's user avatar
57 votes
4 answers
5k views

There has been quite a bit of concern noted relating to the recent discovery that Lenovo are pre-installing a piece of Adware (Superfish) which has the capability of intercepting SSL traffic from ...
Rory McCune's user avatar
  • 62.7k

15 30 50 per page
1
2 3 4 5
8